{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:19:43Z","timestamp":1694636383935},"reference-count":20,"publisher":"Maria Curie-Sklodowska University","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1,1]]},"DOI":"10.2478\/v10065-008-0006-4","type":"journal-article","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T01:19:14Z","timestamp":1250903954000},"source":"Crossref","is-referenced-by-count":0,"title":["Image processing algorithms employing two-dimensional Karhunen-Loeve Transform"],"prefix":"10.17951","volume":"8","author":[{"given":"Pawe\u0142","family":"Forczma\u0144ski","sequence":"first","affiliation":[]}],"member":"7349","reference":[{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","author":"I. Jolliffe","year":"1986","journal-title":"Principal Component Analysis"},{"key":"2","author":"K. Fukunaga","year":"1990","journal-title":"Introduction to Statistical Pattern Recognition"},{"key":"3","article-title":"A Vector Based Approximation of KLT and Its Application to Face Recognition","author":"N. Tsapatsoulis","year":"1998"},{"key":"4","first-page":"19","article-title":"Hierarchical Method of Reduction of Features Dimensionality for Image Recognition and Graphical Data Retrieval","author":"G. Kukharev","year":"2001"},{"key":"5","article-title":"Data Dimensionality Reduction for Face Recognition","volume":"1\/2","author":"G. Kukharev","year":"2004","journal-title":"Machine Graphics and Vision"},{"key":"6","article-title":"Information Embedding in Remotely Sensed Images by Means of Two-Dimensional Karhunen-Loeve Transform","volume":"5B","author":"P. Forczma\u0144ski","year":"2007","journal-title":"Polish Journal of Environmental Studies"},{"key":"7","author":"G. Kukharev","year":"2008","journal-title":"Facial Images Dimensionality Reduction and Recognition by Means of 2DKLT"},{"key":"8","article-title":"The JPEG Still Picture Compression Standard","volume":"4","author":"G. Wallace","year":"1991","journal-title":"Communications of the ACM"},{"key":"9","author":"K. Sayood","year":"2000","journal-title":"Introduction to Data Compression"},{"key":"10","article-title":"High-performance Compression of Visual Information (A Tutorial Review)","volume":"6","author":"O. Egger","year":"1999","journal-title":"Proc. of IEEE"},{"key":"11","first-page":"23","article-title":"An overview of JPEG-2000","author":"M. Marcellin","year":"2000"},{"key":"12","author":"P. Forczma\u0144ski","year":"2006","journal-title":"Kompresja obraz\u00f3w statycznych za pomoc\u0105 dwuwymiarowej analizy komponent\u00f3w g\u0142\u00f3wnych"},{"key":"13","first-page":"93","author":"B. Furht","year":"2004","journal-title":"Multimedia Security Handbook"},{"key":"14","article-title":"2DKLT-based Image Compression and Scrambling","volume":"5A","author":"P. Forczma\u0144ski","year":"2007","journal-title":"Polish Journal of Environmental Studies"},{"key":"15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","article-title":"Digital Watermarking Algorithms and Applications","volume":"4","author":"C. Podilchuk","year":"2001","journal-title":"Proc. IEEE Signal Processing Magazine"},{"key":"16","author":"N. Provos","year":"2003","journal-title":"Hide and Seek: An Introduction to Stegangography"},{"key":"17","first-page":"3564","article-title":"Digital Watermarking of Spectral Images in PCA\/Wavelet Transform Domain","volume":"6","author":"A. Kaarna","year":"2003","journal-title":"Proc. IGARSS"},{"key":"18","first-page":"374","article-title":"Digital Image Watermarking in Spatial and Transform Domains","volume":"3","author":"W. Cheung","year":"2000","journal-title":"Proc. TENCON"},{"key":"19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/4236.935180","article-title":"Digital Steganography, Hiding Data within Data","volume":"3","author":"D. Artz","year":"2001","journal-title":"Proc. IEEE Internet Computing"},{"key":"20","first-page":"26","author":"N. Johnson","year":"1998","journal-title":"Steganography: Seeing the Unseen"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3204\/2400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:18Z","timestamp":1653493638000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,1]]},"references-count":20,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.2478\/v10065-008-0006-4","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2008,1,1]]}}}